Cyware Snags $30M for Threat Intel Infrastructure Tech
Threat intelligence infrastructure startup Cyware on Thursday announced it had secured $30 million in new financing alongside plans to take advantage of the demand for…
Threat intelligence infrastructure startup Cyware on Thursday announced it had secured $30 million in new financing alongside plans to take advantage of the demand for…
Criminal IP, an OSINT-based CTI search engine provided by AI SPERA, has recently announced the introduction of a bug bounty program aimed at strengthening the…
AI Tools have become extremely popular in the software industry and are currently in the initial phase of adoption by other industries as well. There…
By Luca Rognoni, Chief Security Officer and Co-Founder, YEO Messaging Cyber threat landscape has dramatically expanded in recent years due to an exponential increase of…
Cybersecurity researchers at FortiGuard Labs recently found an unseen infostealer dubbed “ThirdEye” that is mainly crafted to steal several information from the systems that are…
By Bob Maley, CSO at Black Kite After last year’s good fight against ransomware gangs, CISOs thought they won. Overall attacks were down and ransom…
[ This article was originally published here ] Executive summary is a technique that hackers use to gain unauthorized access to legitimate credentials using a…
Jun 29, 2023Ravie Lakshmanan The Iranian state-sponsored group dubbed MuddyWater has been attributed to a previously unseen command-and-control (C2) framework called PhonyC2 that’s been put…
ESG [Environment, Social and Governance] is everyone’s favourite new acronym, working as a catch-them-all for climate action, worker rights, social responsibility, and energy efficiency, among…
Ann Dunkin is CIO at the US Department of Energy (DOE). Among her responsibilities, she heads IT and oversees cybersecurity. This week she spoke at…
MITRE shared today this year’s list of the top 25 most dangerous weaknesses plaguing software during the previous two years. Software weaknesses encompass a wide…
Released by the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA), the cybersecurity information sheet (CSI) titled “Defending Continuous Integration/Continuous Delivery…